Control #

F

2

.

2

Log technical misuse attempts and review prompt logs quarterly

Log prompts that appear to seek technical misuse—such as probing for exploit advice or system compromise—and review these logs quarterly to identify emerging threats and strengthen safeguards.

Evidence

We'll list specific evidence that demonstrates compliance with this control. Typically, this is screenshots, proof of a legal or operational policy, or product demonstrations.

Recommended actions

We'll recommend specific practices and actions for complying with this control.

Provide feedback on this control